1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AysviL [449]
3 years ago
11

21. The most overlooked people in information security are:

Computers and Technology
1 answer:
yulyashka [42]3 years ago
8 0

Answer: D. janitors and guards

Explanation:

Information security simply means the protection of information from an unauthorized use or access.

The most overlooked people in information security are the janitors and the guards. Due to the fact that they're at the bottom of the organizational chart, they tend to be overlooked and not given the respect that they deserve.

You might be interested in
Have you ever been presented to someone else's home page of a given website?​
worty [1.4K]

Answer: No, is this the question?

Explanation: Have a stupendous day! <3

6 0
3 years ago
Software that interprets commands from the keyboard and mouse is also known as the
Stells [14]
A) operating system
It is going to let you "operate" it using the mouse and keyboard
4 0
3 years ago
Read 2 more answers
Create a 100-word internet company​
vodomira [7]

Answer:

The World Wide Web.

Explanation:

The World Wide Web was created at CERN in Switzerland in 1990. Today, people can pay money to access the Internet from internet service providers.

<em>Hope this helps!</em>

<em />

<em>xoxo,</em>

<em />

<em>cafeology</em>

4 0
3 years ago
A technician is trying to access a user's files and is unable to open any folder or file. Which of the following BEST describes
vodomira [7]

<em>The answer is </em><em>D. The technician does not have permission. </em>

<em> </em>

<em>Folders are locked that's why he couldn't open any folder or file. There must be a prompt telling him that he doesn't have an access or authority to open those files. This could be done via Folder sharing in the network. And a shared folder can be customized by assigning the proper and correct permission to each user.</em>

4 0
3 years ago
A space in a document that is typically in templates to hold pictures or text until the final text is inserted is called a _____
yKpoI14uk [10]

Answer:

D. placeholder

Placeholder are like the field you enter your username and passwords and etc. They can be easily understood my the name itself!

Hope this is the correct answer!

Bye!

6 0
3 years ago
Read 2 more answers
Other questions:
  • Identify the flaws / limitations in the following ConvertToNumber method:
    10·1 answer
  • 3. What type of error is in the following sentence? "George W. Bush is the President of the United States of
    5·1 answer
  • What operating system type uses icons to represent programs
    9·2 answers
  • The means by which an operating system or any other program interacts with the user is called th
    6·1 answer
  • Select the true statement from the choices below. Group of answer choices Invalid code may cause browsers to render the pages sl
    11·1 answer
  • Which page feature is used in long documents to assist readers in quickly finding information in the document without having to
    11·2 answers
  • While there are a some exceptions such as an if-statement, Scheme has one primary syntax () a) True b) False
    14·1 answer
  • WHAT DOES INFORMATION TECHNOLOGY DO??<br> Do they offer services or products
    15·1 answer
  • 5. Compare the telephone network and the internet. What are the similarities? What are the differences?
    12·1 answer
  • Your program will be used by many departments at the university. Your comments will be important to their IT people. What would
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!